Search Results - (( code application window algorithm ) OR ( java applications usage algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2
  3. 3

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…The search algorithm is a crucial part in any internet applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5
  6. 6
  7. 7

    The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat by Selamat, Noor Saedah

    Published 1996
    “…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Filling and restoration of cracked digitized paintings based on preserved neighbourhood pixels by Farajalla Ali, Nawafil Abdulwahab, Alshaikhli, Imad Fakhri Taha

    Published 2021
    “…This paper investigates the applicability of a proposed digital image algorithm for filling cracks in digitized paintings. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    FPGA Implementation of Emergency Door Car Entry System by Zaini Sulaiman

    Published 2008
    “…FPGA board is a board that can be programmed using source code to run the application that has been downloaded into it. …”
    Get full text
    Learning Object
  12. 12
  13. 13
  14. 14

    On-chip communication system modeling approach for reability analysis focusing on functional failures by Forooshani, Arash Abtahi

    Published 2012
    “…The algorithms were verified and the resultsshow that minimum accuracy of 96% is maintained by applying the proposed crosstalk modeling approach while the number of required simulations is reduced by at least factor of 59% for modeling window sizes bigger than 3. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis